Modular Malware Boolka’s BMANAGER Trojan Exposed
Security researchers from Group-IB have unveiled the operations of a threat actor known as Boolka, whose activities involve deploying sophisticated...
Security researchers from Group-IB have unveiled the operations of a threat actor known as Boolka, whose activities involve deploying sophisticated...
Cryptocurrency exchange Kraken has said it is “coordinating with law enforcement” after security researchers allegedly attempted to extort the firm following...
A prolific threat actor has claimed to have breached tech giants AMD and Apple, stealing source code for internal tools,...
Russian-aligned threat actor Nobelium has been continuously targeting French diplomatic entities and public organizations since 2021, according to the French...
The US Cybersecurity and Infrastructure Security Agency (CISA) has revealed its Chemical Security Assessment Tool (CSAT) was breached by a...
Threat actors have published nearly 400GB of data stolen from pathology provider Synnovis, including sensitive NHS patient information, according to...
The notorious LockBit group has reemerged to become the most prominent ransomware actor in May 2024, according to a new...
The US government has banned cybersecurity provider Kaspersky from selling its products in the country because of the company’s alleged...
Introduction Communication with tunnelling services like LocaltoNet can be a red flag in network security. LocaltoNet is a reverse proxy...
British and US enterprises may be throwing away as much as $756m each year through lost productivity due to burned-out...
The G7 nations will develop a collective cybersecurity framework for operational technologies in energy systems, aimed at both manufacturers and...
VMware has disclosed critical vulnerabilities impacting its VMware vSphere and VMware Cloud Foundation products, urging customers to immediately install updates...
Threat actors are increasingly targeting edge devices known as load balancers, according to new data from Action1 which revealed a...
More than nine in 10 (92%) organizations experienced an average of six credential compromises caused by email-based social engineering attacks...
Digital transformation projects appear to be accelerating faster than organizations’ efforts to secure them, with nearly a quarter (23%) admitting they...
Over 800 planned operations and 700 outpatient appointments had to be rearranged in the first week after a critical ransomware...
Large language models (LLMs) are increasingly used for cyber defense applications, although concerns about their reliability and accuracy remain a...
Los Angeles County Department of Public Health (DPH) has disclosed a data breach impacting more than 200,000 individuals.The data stolen...
Meta has delayed plans to train its large language models (LLMs) using public content shared on Facebook and Instagram following...
A new report has revealed apparently secretive attempts by a Chinese state-owned enterprise to access cutting-edge AI research at a...
Three weeks before the UK general election, Matthew Feeney, head of tech and innovation at the UK-based Centre for Policy...
Microsoft President Brad Smith had admitted security failings by the firm in enabling Chinese state hackers access the emails of...
A sophisticated Chinese espionage campaign targeting Fortinet edge devices was far more extensive than previously thought, resulting in the compromise...
A backdoor in Executable and Linkable Format (ELF) files used by Chinese hackers has wrongly been identified as a variant...